homepage

This issue tracker has been migrated to GitHub , and is currently read-only.
For more information, see the GitHub FAQs in the Python's Developer Guide.

Author kristjan.jonsson
Recipients giampaolo.rodola, kristjan.jonsson, sbt
Date 2012年03月19日.19:18:35
SpamBayes Score 3.8221733e-06
Marked as misclassified No
Message-id <1332184716.51.0.320003444901.issue14310@psf.upfronthosting.co.za>
In-reply-to
Content
Good point. The docs don't actually say, except that the docs show a pretty elaborate process dance, where the source process only closes its side of the socket once the target process has called WSASocket().
If duplication happened early, then there would have to be a way to "unduplicate" it in the source process if, say, IPC somehow failed. There is currently no api to undo the effects of WSADuplicateSocket().
It's easy enough to test, of course. I ́ll do some test using my unittest.
History
Date User Action Args
2012年03月19日 19:18:36kristjan.jonssonsetrecipients: + kristjan.jonsson, giampaolo.rodola, sbt
2012年03月19日 19:18:36kristjan.jonssonsetmessageid: <1332184716.51.0.320003444901.issue14310@psf.upfronthosting.co.za>
2012年03月19日 19:18:35kristjan.jonssonlinkissue14310 messages
2012年03月19日 19:18:35kristjan.jonssoncreate

AltStyle によって変換されたページ (->オリジナル) /